An innovative replacement to the traditional mechanical key...

If you want the knowledge and control of who is coming and going in your busy workplace then cyberlock is the answer!

Imagine if the keys & locks in your company could talk to you! If you could control who went where and at what time, received regular information updates and changed the access privileges at the click of a button.
Control when you need it most with a fully supported software integration for audit trail and adding or deleting of keys remotely. Cyberlock is an easy to use custom design electronic key system that can suit any application in a cost effective way.
No Wires, No Power, replace the existing cylinder and in an instant you now have Access Control to a single door or 1,000’s of doors or even padlocks, which can stand alone or be software driven.

How It WorksThe CyberlockThe CyberkeyCommunicationsEKA SoftwareFlex Hub
how-it-works-1 how-it-works-2 how-it-works-3 how-it-works-4 how-it-works-5

When a CyberKey meets an CyberLock, an instant information exchange determines whether the key has access to that specific lock. Whether access is granted or denied, the time of the event and the unique ID of the key used is stored in both the lock and the key.

CyberLock cylinders are the exact dimensions of the normal lock cylinders they replace. The absence of a conventional keyway means it is not vulnerable to being picked. As the CyberLock cylinder needs no power or wiring it’s ideal for remote and mobile assets.

Each CyberKey contains a battery and the individual’s access privileges. This powers all the electronics and operates the lock. For example the key can be programmed to allow access from 8am to 6pm on weekdays and 10am to 4pm Sundays. It can even be programmed to expire so it cannot function until reactivated.

Access privileges are distributed through communicators linked to your EKA software via network or internet. When validating keys, the system downloads the key’s stored data for audit. It then uploads any new access privileges. EKA access privileges can be programmed to expire. This forces users to update keys regularly.

Centralised, web based software allows facility managers to assign keys, set access permissions and expiry times. They can also create access groups and schedules, and activate new EKA locks. It also enables auditing and tracking through reports and automatic notification of suspicious activities.

Through a hub called Flex, EKA is able to integrate with and manage any other access control system that uses a Weigand — compatible input device-from RFID, to electronic swipe and HID, Maglocks electronic strikes, and even bio-metric devices.

The Cyberlock

CyberLocks are the exact dimensions of the mechanical cylinders they replace. They retrofit into the lock hardware with the ease of a mechanical cylinder, and do not change how the lock operates.

More than 300 existing CyberLock designs enable it to be installed in an enormous variety of interior and exterior doors, padlocks, containers and cabinets. There’s no wiring and no battery. All power is provided by the CyberKey: when a key comes in contact with the cylinder, it powers up the lock’s circuitry so key and lock communicate. If the key is not on the lost key list and the permissions are correct, the lock will open.

The circuitry stores four types of information: encrypted codes that ensure only keys within the system work with the lock; the unique ID number of the CyberLock; a record of the last 1,100 entries; and a list of lost keys to eliminate access by any key that is missing or lost.

CyberLocks offer superior physical security. They have no conventional keyway that is vulnerable to being picked plus a tamper plug prevents the lock from opening if the front of the cylinder is struck.

Moreover, if torque is applied to cylinder, the front part separates from the back half. The back half of the cylinder expands, causing a brake effect that engages the sides of the cylinder’s case, stopping the rotation and leaving the cylinder in the locked position.

The CyberKey is an electronic, programmable smart key that cannot be duplicated. Via a communicator, each key can be programmed with the permissions for every system lock a key holder is allowed to access: what locks the key can open, as well as the days and times each lock can be opened. In this way, each user only needs one key to access any lock in a system, whether it’s a major entry door, or an obscure and remote cabinet padlock. Because it’s electronic, permissions can be revoked.
Administrators can set key expirations to occur regularly (daily, weekly or more often) and can also do this on an ad-hoc basis when keys are lost. Each CyberKey key contains four levels of intelligence: encrypted access codes to ensure the key is from the same installation; the unique ID number of the key; access privileges for the user of the key; and storage of up to the last 3,900 events, both entries and denied entries.
The unique exchange of encrypted access codes between the lock and key gives a high degree of key integrity. The encrypted codes ensure keys from other systems cannot work in your system.
The Cyberkey

Communicators underpin the flexibility of EKA.

A network of communicators (each communicator can be given an IP address) allows users to validate their CyberKeys without returning to where the EKA software is hosted, instantly downloading audit trail data and receiving updated access permissions. Communicators are also designed to recharge rechargeable CyberKeys. Communicators are so versatile that they can be mounted almost anywhere, maximising ability to control access to even the remotest assets.
Cyberlock Communications

Single-key Vault Cabinet - Remote locations such as maintenance sheds often have many people areas requiring access. By allocating a PIN access code or swipe card to each user, one key is shared among many users, yet every user’s access history can be individually audited.

20-key Vault Cabinet - Ideal for large offices, this intelligent key cabinet stores keys in an inactive state. A swipe or PIN code is required to activate a key, and when staff return keys they are deactivated until they are next retrieved.

Authoriser Keypad - An authoriser keypad is a durable, weather-proof unit that is fitted to the exterior of a building or facility. Users present their key to the authoriser and enter a PIN code to obtain permission privileges.

Mini Keyport - This smaller version of the authoriser can be employed when the additional security of keypad and PIN codes are not required.

USB Station - In a smaller office, when your EKA software might only sit on a desktop, a simple USB station port is a cost-effective way to authorise keys.

Web Station - Web stations multi-point access and updating via cat-5 are ideal for larger, network server systems.

IR Encoder - This compact USB dongle connects to any CyberKeys via infra-red connection. It’s ideal for remote and mobile workers.

Advanced monitoring and reporting

EKA’s server-based modular software system is capable of handling complex and numerous geographically remote installations of as many as 15,000 keys and 15,000 locks. A hierarchy of administrators allows individual managers responsibility for only the locks and the people in their area. It even manages assets across countries and time zones.
An intuitive point-and-click, browser-based interface that uses drop-down information boxes is all that’s needed to access the modules that drive EKA’s access control, monitoring and reporting capabilities. Location graphics. Create a graphical interface of your office that allows you to place the location of CyberLocks and Communicators for improved tracking and auditing. Door & Input / Output Support. Through Flex, manage access to Wiegand-compatible thirdparty systems such as swipe cards, RFID and biometric readers. Doors can also be set to unlock and relock at certain times and alarms can be triggered if a door is forced or left open. Locks. See all locks and individually set access and reporting characteristics. Options include: delayed access, access only with a number of keys and email notification of denied access. People and keys. Allocate individual keys to users. Set days and times they have access to certain locks, how soon the key’s access permissions expire and even revoke a lost key. Schedules. Set schedules of who can go where at what time. This can be as specific as a few minutes at a certain time on one or two days of each week.

  • Detailed audit trail
  • Set two, three or four-way access
  • Denied access email alerts
  • Hierarchy of administrators
  • Remote key initiation via Android & Blackberry
  • Key scheduling and expiry
  • Set delayed access
  • Set group access permissions
  • Multiple time zone management
  • Monitors and controls third-party systems

Many locks, one control interface

Cyberlock Flex Hub

Until now, if you installed different types of locking systems you had no choice except to operate and manage them independently. Sitting side-by-side, the result is more expense, more operational work for facility and asset managers, and more opportunities for security breaches.

EKA solves this through a system that can deliver single, unified access control. Through a hub called Flex, EKA is able to integrate with and manage any other access control system that uses a Weigand — compatible input device-from RFID, to electronic swipe and HID, Maglocks electronic strikes, and even bio-metric devices.

Flex Hub Infographic

click to view larger image

Cyberlock Flex Hub